Developing and Implementing a Successful Insider Threat Strategy and Plan

Video created by kristen.palazzolo Employee on Jan 13, 2017

    Enterprises today face the risk of attacks to their data from the outside and the inside. Employees or employee identities are typical attack vectors for a low-and-slow data exfiltration attack. In this session, CA Technologies CIO, Mahendra Durai, will explore the strategies and approaches an enterprise can adopt to create and implement a comprehensive insider-threat protection plan with user behavior analytics, "indicators of compromise" hunting strategies and red-team exercises designed to identify, detect, protect and respond to threat and risk scenarios.